How Does Symmetric and Asymmetric Public Key Cryptography Work?by@Shiva
1,114 reads
1,114 reads

How Does Symmetric and Asymmetric Public Key Cryptography Work?

by Shiva Sai Kumar B3mFebruary 14th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

There are two types of Cryptography: Symmetric cryptography and Asymmetric Cryptography. Cryptography encodes the message in a way that no one can decrypt it except the receiver. This keeps the data safe from an eavesdropper, where they cannot read and understand the format. The Receiver uses the Receiver’s username to send the data to them and reads the data. This makes the system safe from eavesdroppers and more robust. Asymmetry Cryptography uses Key-pairs to decrypt the data and uses a single key to encrypt and decrypt.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How Does Symmetric and Asymmetric Public Key Cryptography Work?
Shiva Sai Kumar B HackerNoon profile picture
Shiva Sai Kumar B

Shiva Sai Kumar B

@Shiva

Blockchain Developer, Librocubicularist, Content writer.

About @Shiva
LEARN MORE ABOUT @SHIVA'S
EXPERTISE AND PLACE ON THE INTERNET.

Share Your Thoughts

About Author

Shiva Sai Kumar B HackerNoon profile picture
Shiva Sai Kumar B@Shiva
Blockchain Developer, Librocubicularist, Content writer.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!